Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 20:31
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Bootstrapper.exe
Resource
win10v2004-20241007-en
General
-
Target
Bootstrapper.exe
-
Size
8.6MB
-
MD5
0e38cfa2000ec11b550eb8c33b8edb88
-
SHA1
e541797b3f4c4a25e7b1d906328d975585f727f0
-
SHA256
8b4964f47b29d20eded08b48a372e55dd6cdcb83fb6ceee17ea6b5e77ecd89d2
-
SHA512
ca1de9f82bd5885dae93a7cd305f479ecf56604eba857f3aa9ada9526227213a13307a85a96dcd83633b4faf4dbef52facff7127d4d308cc68dc9f0c73254e25
-
SSDEEP
196608:xCQcYJCxe+1urErvI9pWjgN3ZdahF0pbH1AVX/O2kiGrUniC+ICz0fSn87:xvYurEUWjqeWxaNrGrgSV+
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 2552 Bootstrapper.exe 2552 Bootstrapper.exe 2552 Bootstrapper.exe 2552 Bootstrapper.exe 2552 Bootstrapper.exe 2552 Bootstrapper.exe 2552 Bootstrapper.exe -
resource yara_rule behavioral1/files/0x000500000001a48f-74.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2552 1720 Bootstrapper.exe 31 PID 1720 wrote to memory of 2552 1720 Bootstrapper.exe 31 PID 1720 wrote to memory of 2552 1720 Bootstrapper.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"2⤵
- Loads dropped DLL
PID:2552
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5b38d5b15f77e6cd93763c76ff1bc79ee
SHA1cadffe8a06835a7c1aa136a5515302d80d8e7419
SHA256aa9e41933f1cf1c3bcc3b65771297b0ef088fac153c7997c0d48e7882714d05f
SHA51246eaeb419654efd999146b9cd55ece42939e071f089ccb4698a09f4bb6b881106a3e342901439f867f609c1147ef151832b2919d2a33726643a6e5c4086a5f3a
-
Filesize
1.7MB
MD518677d48ba556e529b73d6e60afaf812
SHA168f93ed1e3425432ac639a8f0911c144f1d4c986
SHA2568e2c03e1ee5068c16e61d3037a10371f2e9613221a165150008bef04474a8af8
SHA512a843ab3a180684c4f5cae0240da19291e7ed9ae675c9356334386397561c527ab728d73767459350fa67624f389411d03665f69637c5f5c268011d1b103d0b02
-
Filesize
1.1MB
MD5a6b4fba258d519da313f7be057435ee4
SHA10bf414057d0749e9db4da7683eb6d11be174cdd5
SHA256aa092722797b9a74e9463516e6c63d4d3c904ac263f4a4ea421b0d4d4875f606
SHA51234f3d006a9bb7835e9d82465874e059a328c8d69abd61c79d6a85a7702df582dabc93126918a0514356fda2810c77acc1d6070ad4418921bd9e8efe34697e4a1
-
Filesize
22KB
MD5e1d37d21f7875483ae0d187032d5714c
SHA151a945a9e6ccf994781a028cd07ab8ee820f542c
SHA2561076a19f2a42a35c8639fb1ce1666d046e0fd259142f7e645e350211d9d6390f
SHA51277973d6e5e6ad68b304f50184a95be9d4993338f4f69e07c11275951b2fcfdc02c061182d1a7a394dc18fe77d6d021dd9e8e17cdfbbb8d0c77752c6df1979011
-
Filesize
22KB
MD509fed91680050e3149c29cf068bc10e5
SHA1e9933b81c1d7b717f230ea98bb6bafbc1761ec4a
SHA2563c5900c9e7fbada56e86d8973a582771dde6bff79ca80ae05920a33a2cc435df
SHA512e514590385561731f2ad18afd6bcefac012ea8061a40b6ccfda4e45ff5768617b2e1b06e849e8a640a10ca59039e89ba88cac5d3b7ff088968eb4bc78e212d3a
-
Filesize
22KB
MD50f99a725b93375f0ba8795e67e5a4fdf
SHA19825f0ec9cc4ba99471f4587d4bf97f7083d5f93
SHA256be77a15dcaf73a7c1be6c62f57e79ef7bbc305e1b7753a4345ba1d88851dba08
SHA512f95b6472b78f2bea732c6cc4933c83da7cbbf3eec67544b9faf86c6d6183c23e47afadb23e78420ed2dcec7ddde819e0fcb14345614c5acb3d959fca7c5a7468
-
Filesize
22KB
MD5dd86613bbc3da5e41d8bd30803d87c1f
SHA135690b9b0fe48f045568e25221694be041f56d4f
SHA2562312923d7e07c1f58f457ac434b89c01ce675ff42d74bb279326d6c573f675ed
SHA5126d4a29c99e819368389a9347a719e78125dfbc3166af85425db81f38833b57ba28251472dd42db974876bcf8bc73465d638678b06e3482ceb36c19b943f41ca4